Re-imagining Vivaldi with HTML5/WebGL. PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch
|
|
- Leslie Dennis
- 5 years ago
- Views:
Transcription
1 Re-imagining Vivaldi with HTML5/WebGL PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline Problem Scenario Motivation Goal Network Coordinate System (NCS) Model Space Vivaldi Discussion and Examples Demo Summary 15 October
2 Problem Scenario Client wants to select a Server with the lowest round trip time (RTT) Measure RTT with all Servers? Wastes resources (eg. Bandwidth) May overflow NAT Table poor performance May take a long time to gather all RTT measurements After time t, RTT measurements are stale dmirkovic@swin.edu.au 15 October Motivation Peer-to-peer (P2P) applications treat the Internet as a black box Client-Server model optimal selection can be improved Scenarios: Network Coordinate System (NCS) with large number of nodes or small data size can improve performance and resource allocation dmirkovic@swin.edu.au 15 October
3 Goal A model that is able to predict the distance between two Nodes, given only a few measurements. dmirkovic@swin.edu.au 15 October Network Coordinate Systems (NCS) Centralised Predict using Synthetic Coordinates as described in Global Network Positioning (GNP) [1] Requires Landmark(s) (most likely being Server Nodes or accurate Nodes) Decentralised Predict using Network Coordinate System as described in Vivaldi [2] Landmark(s) are optional [1] - [2] dmirkovic@swin.edu.au 15 October
4 Model Space N-dimension Euclidean Model At least 2D Model is required Increasing N-dimensions substantially in Euclidean Model does not have significant improvements May have an opposite undesired effect increasing the computational power required for higher N-dimensions Using a 3D to 5D Model is adequate 2D + Height Vector Model Spherical Model Cylindrical Model dmirkovic@swin.edu.au 15 October Decentralised - Vivaldi Vivaldi is solving a simultaneous equation distributed in time and space Nodes iteratively update their own coordinates based on current network state A Local Node that is communicating with Remote Node(s) requires a very small sample of Remote Node(s) to get an overall state Nodes communicating can piggyback on existing application traffic Adds very little overhead dmirkovic@swin.edu.au 15 October
5 Springs Overestimate and Underestimate RTT Difference between measured and calculated RTT Springs compress and stretch to move Node D to new coordinate space after n iterations of Vivaldi Push and Pull effect (Hooke s Law) dmirkovic@swin.edu.au 15 October Triangle Inequality NCS assumption is that Triangle Inequality holds for Node paths. The sum of the lengths of any two sides, must be greater than or equal to the length of remaining side. [1] Eg. bc ab + ac [1] - dmirkovic@swin.edu.au 15 October
6 Vivaldi Example 1 (Step 1) Local Node A will do sequence of communication with other Remote Nodes (B and C) dmirkovic@swin.edu.au 15 October Vivaldi Example 1 (Step 2) A receives B s Coordinates (-20, 15) and RTT (30ms) A calculates distance to B (50ms) RTT A, B = (A x B x ) 2 +(A y B y ) 2 RTT A, B = (A x B x ) 2 +(A y B y ) 2 dmirkovic@swin.edu.au 15 October
7 Vivaldi Example 1 (Step 3) Overestimated: A needs to be pulled towards B dmirkovic@swin.edu.au 15 October Vivaldi Example 1 (Step 4) A (over n-iterations not instantly!) approaches B s measured RTT. A adjusts coordinates (A x, A y ) dmirkovic@swin.edu.au 15 October
8 Vivaldi Example 1 (Step 5) A communicates with C Note: coordinate position of A has been moved (when A completed one iteration of Vivaldi with B) dmirkovic@swin.edu.au 15 October Vivaldi Example 1 (Step 6) A receives C s Coordinates (50, -25) and RTT (40ms) A calculates distance to C (20ms) RTT A, B = (A x B x ) 2 +(A y B y ) 2 dmirkovic@swin.edu.au 15 October
9 Vivaldi Example 1 (Step 7) Underestimated: A needs to be pushed away from C dmirkovic@swin.edu.au 15 October Vivaldi Example 1 (Step 8) A (over n-iterations) approaches C s measured RTT. A adjusts coordinates (A x, A y ) dmirkovic@swin.edu.au 15 October
10 Vivaldi Example 1 (Step 9) Previous slide, the distance between A and B now would be wrong Vivaldi process will iterate until all Local and Remote Nodes measured RTT have same calculated distance (or RTT) dmirkovic@swin.edu.au 15 October Vivaldi Landmarks Example 2 (Step 1) 13 Stable Landmark Nodes (A to M) calculated their coordinates (over n-iterations). New Node N joins the process dmirkovic@swin.edu.au 15 October
11 Vivaldi Landmarks Example 2 (Step 2) 2D Euclidean Model requires at least 3 Remote Node samples, otherwise many solutions may exist in NCS Number of Remote Node samples is equal to number of dimensions + 1 (3D would need 4, 4D would need 5, etc) N needs 3 Remote Node samples: Does N select 3 random? Does N select more than 3 random? If Landmarks used: Does N select 3 shortest RTT measured? Does N select 3 longest RTT measured? Does N select 3 different geographical locations? dmirkovic@swin.edu.au 15 October Vivaldi Landmarks Example 2 (Step 3) N randomly selected Remote Nodes (E, F, and M). Measured RTT from E, F, and M are 200ms, 150ms, and 30ms respectively dmirkovic@swin.edu.au 15 October
12 Vivaldi Landmarks Example 2 (Step 4) N after n-iterations of Vivaldi determines coordinates and satisfies the computed RTT to be the same as measured RTT dmirkovic@swin.edu.au 15 October Vivaldi Landmarks Example 2 (Step 5) RTT between N and Remote Nodes (A, B, C, D, G, H, I, J, K, and L) can be predicted by the Euclidean Distance between their coordinates without direct measurement dmirkovic@swin.edu.au 15 October
13 Vivaldi Landmarks Example 2 (Step 6) N best option is C (25ms) N calculates the predicted RTT for A, B, C, D, G, H, I, J, K, and L faster than it takes to measure the RTT for each Remote Node Previous scenario had only 13 Remote Nodes, what if we had a large number of Remote Nodes (10,000, 100,000, 1 million, etc)? dmirkovic@swin.edu.au 15 October Vivaldi space rotation Each Node in the Vivaldi process starts at the origin, and obtains a random starting position Vivaldi with different seeds (varying random starting position) using the same experimental data, an interesting observation is that: the overall stable position in NCS in one seed universe becomes nearly like a rotation in the second seed universe dmirkovic@swin.edu.au 15 October
14 Vivaldi Caveats Triangle Inequality violations Malicious Nodes can affect the calculated coordinates 15 October Demo of 3D Vivaldi Simulations Hard to conceptualise the overall Vivaldi process without a suitable simulation tool dmirkovic@swin.edu.au 15 October
15 Summary Vivaldi is a decentralised NCS 3D 5D Euclidean Model is an acceptable model to use in NCS Vivaldi can optimise application performance and resource allocation dmirkovic@swin.edu.au 15 October Acknowledgement Thank you very much to Prof. Grenville Armitage and Dr. Philip Branch for their supervision support throughout my PhD. dmirkovic@swin.edu.au 15 October
16 Questions? 15 October
Vivaldi Practical, Distributed Internet Coordinates
Vivaldi Practical, Distributed Internet Coordinates Frank Dabek Russ Cox Robert Morris Frans Kaashoek Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology ACM SIGCOMM
More informationVivaldi: : A Decentralized Network Coordinate System
Vivaldi: : A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Presenter: Yi-Chao Chen 1 Introduction Design Issues Idea Algorithm Evaluation Model
More informationVivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04
Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates
More informationVivaldi Practical, Distributed Internet Coordinates
Vivaldi Practical, Distributed Internet Coordinates Russ Cox, Frank Dabek, Frans Kaashoek, Robert Morris, and many others rsc@mit.edu Computer Science and Artificial Intelligence Lab Massachusetts Institute
More informationVivaldi: A Decentralized Coordinate System
Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer
More informationBuilding Large-scale Distributed Systems with Network Coordinates
Distributed Software Engineering (DSE) Group Department of Computing Building Large-scale Distributed Systems with Network Coordinates Peter Pietzuch prp@doc.ic.ac.uk Distributed Software Engineering (DSE)
More informationAutomated Traffic Classification and Application Identification using Machine Learning. Sebastian Zander, Thuy Nguyen, Grenville Armitage
Automated Traffic Classification and Application Identification using Machine Learning Sebastian Zander, Thuy Nguyen, Grenville Armitage {szander,tnguyen,garmitage}@swin.edu.au Centre for Advanced Internet
More informationInternet Coordinate Systems Tutorial
Internet Coordinate Systems Tutorial Marcelo Pias marcelo.pias@cl.cam.ac.uk Outline Motivation Problem statement General Approach Techniques Global Network Positioning (GNP) Practical Internet Coordinates
More informationCAIA Realtime VoIP Classification and Redirection Djuro Mirkovic.
CAIA Realtime VoIP Classification and Redirection Djuro Mirkovic 7185863@student.swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline Multiple Access
More informationNetwork Coordinates in the Wild
Network Coordinates in the Wild Jonathan Ledlie Margo Seltzer Paul Gardner Harvard University Aelitis / Azureus Hourglass Project http://www.eecs.harvard.edu/~syrah/hourglass Jonathan Ledlie - Harvard
More informationBGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage.
BGP Anomaly Detection Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage balmusawi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University
More informationCSC D70: Compiler Optimization Register Allocation
CSC D70: Compiler Optimization Register Allocation Prof. Gennady Pekhimenko University of Toronto Winter 2018 The content of this lecture is adapted from the lectures of Todd Mowry and Phillip Gibbons
More informationVivaldi: A Decentralized Network Coordinate System
Vivaldi: A Decentralized Network Coordinate System Xintong Wang, Han Zhang EECS 589 Paper Review 1 Full Reference Authors: Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris. Title: Vivaldi: A Decentralized
More informationCharm: A charming network coordinate system
Charm: A charming network coordinate system Çağatay Demiralp December 5, 27 Abstract We present a new network coordinate system, Charm, embedding round-trip time latencies into the Euclidean space. Charm
More informationBittorrent traffic classification
Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-
More informationCoordinate-based Routing:
Coordinate-based Routing: Refining NodeIds in Fabian Hartmann and Bernhard Heep P2PNet 09 (in conjunction with ICUMT 09) St. Petersburg, Russia Motivation Structured P2P overlays offering key-based routing
More informationA Clustering Approach to the Bounded Diameter Minimum Spanning Tree Problem Using Ants. Outline. Tyler Derr. Thesis Adviser: Dr. Thang N.
A Clustering Approach to the Bounded Diameter Minimum Spanning Tree Problem Using Ants Tyler Derr Thesis Adviser: Dr. Thang N. Bui Department of Math & Computer Science Penn State Harrisburg Spring 2015
More informationPlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems
PlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems Fenglin Liao, Keshava P Subramanya, Veljko Pejovic, Ben Zhao {fenglin, keshava, veljko, ravenben} @ cs.ucsb.edu Abstract - In
More informationVivaldi: A Decentralized Network Coordinate System
Vivaldi: A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Cambridge, MA fdabek,rsc,kaashoek,rtm@mit.edu ABSTRACT Large-scale Internet applications
More informationSkeleton-Based Shape Deformation using Simplex Transformations
Computer Graphics International 2006 Skeleton-Based Shape Deformation using Simplex Transformations Han-Bing Yan, Shi-Min Hu and Ralph Martin Outline Motivation Introduction Mesh segmentation using skeleton
More informationVeracity: Practical Secure Network Coordinates via Vote-Based Agreements
Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems
More informationSection The Law of Sines and the Law of Cosines
Section 7.3 - The Law of Sines and the Law of Cosines Sometimes you will need to solve a triangle that is not a right triangle. This type of triangle is called an oblique triangle. To solve an oblique
More information1-8 Exploring Transformations
1-8 Exploring Transformations Warm Up Lesson Presentation Lesson Quiz 2 Warm Up Plot each point. D 1. A(0,0) 2. B(5,0) 3. C( 5,0) 4. D(0,5) 5. E(0, 5) 6. F( 5, 5) C A F E B Objectives Apply transformations
More informationTowards Optimal Data Replication Across Data Centers
Towards Optimal Data Replication Across Data Centers Fan Ping, Xiaohu Li, Christopher McConnell, Rohini Vabbalareddy, Jeong-Hyon Hwang Department of Computer Science University at Albany - SUNY {apping,
More information<Outline> Mathematical Training Program for Laotian Teachers
Mathematical Training Program for Laotian Teachers Euclidean Geometry Analytic Geometry Trigonometry Dr Wattana Toutip Department of Mathematics Faculty of Science Khon Kaen University February
More informationObjectives. Vocabulary. 1-1 Exploring Transformations
Warm Up Plot each point. D Warm Up Lesson Presentation Lesson Quiz 1. A(0,0) 2. B(5,0) 3. C( 5,0) 4. D(0,5) C A B 5. E(0, 5) 6. F( 5, 5) F E Algebra 2 Objectives Apply transformations to points and sets
More informationDefine the red- black tree properties Describe and implement rotations Implement red- black tree insertion
Red black trees Define the red- black tree properties Describe and implement rotations Implement red- black tree insertion We will skip red- black tree deletion October 2004 John Edgar 2 Items can be inserted
More informationYou ll use the six trigonometric functions of an angle to do this. In some cases, you will be able to use properties of the = 46
Math 1330 Section 6.2 Section 7.1: Right-Triangle Applications In this section, we ll solve right triangles. In some problems you will be asked to find one or two specific pieces of information, but often
More informationa) A(5,7) and B(3,9) b) E( 1, 4) and F( 2,8) 2) find the equation of the line, in the form y=mx+b, that goes through the points: y = mx + b
.1 medians DO IT NOW.1 Median of a Triangle 1) Determine the coordinates of the midpoint of the line segment defined by each pair of endpoints: a) A(5,7) and B(3,9) b) E( 1, 4) and F(,8) ) find the equation
More informationA Synthetic Traffic Model for Half-Life
A Synthetic Traffic Model for Half-Life Tanja Lang, Grenville Armitage, Phillip Branch, Hwan-Yi Choo Centre for Advanced Internet Architectures Swinburne University of Technology Melbourne, Australia tlang@swin.edu.au,
More informationThe same procedure is used for the other factors.
When DOE Wisdom software is opened for a new experiment, only two folders appear; the message log folder and the design folder. The message log folder includes any error message information that occurs
More informationCONTENT-DISTRIBUTION NETWORKS
CONTENT-DISTRIBUTION NETWORKS George Porter June 1, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license These
More information[Note: each line drawn must be a single line segment satisfying x = 3] (b) y = x drawn 1 B1 for y = x drawn
1. (a) x = 3 drawn 1 B1 for x = 3 drawn (b) y = x drawn 1 B1 for y = x drawn [Note: each line drawn must be a single line segment satisfying x = 3] [Note: each line drawn must be a single line segment
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : TB0-121 Title : TIBCO ActiveMatrix BPM Solution Designer Vendors : Tibco Version : DEMO Get Latest
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality
More informationCCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4
CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication
More informationRed-Black-Trees and Heaps in Timestamp-Adjusting Sweepline Based Algorithms
Department of Informatics, University of Zürich Vertiefungsarbeit Red-Black-Trees and Heaps in Timestamp-Adjusting Sweepline Based Algorithms Mirko Richter Matrikelnummer: 12-917-175 Email: mirko.richter@uzh.ch
More informationCSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017
CSE 124: CONTENT-DISTRIBUTION NETWORKS George Porter December 4, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons
More informationCS419: Computer Networks. Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance
: Computer Networks Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance TCP performance We ve seen how TCP the protocol works But there are a lot of tricks required to make it work well Indeed,
More informationAlgorithms for Bioinformatics
Adapted from slides by Leena Salmena and Veli Mäkinen, which are partly from http: //bix.ucsd.edu/bioalgorithms/slides.php. 582670 Algorithms for Bioinformatics Lecture 6: Distance based clustering and
More informationNear Neighbor Search in High Dimensional Data (1) Dr. Anwar Alhenshiri
Near Neighbor Search in High Dimensional Data (1) Dr. Anwar Alhenshiri Scene Completion Problem The Bare Data Approach High Dimensional Data Many real-world problems Web Search and Text Mining Billions
More informationParallel Lines Investigation
Year 9 - The Maths Knowledge Autumn 1 (x, y) Along the corridor, up the stairs (3,1) x = 3 Gradient (-5,-2) (0,0) y-intercept Vertical lines are always x = y = 6 Horizontal lines are always y = Parallel
More information? Answer:
A1 What is the value of 1 2 + 2 3 + 3 4 + 4 5 5 2? A2 What is the value of k? 11 2 22 2 33 2 = 66 2 k. A3 The four-digit integers 5634 and 6435 share the following two properties: (i) they consist of four
More informationRecap A Search Optimality of A. Search: A. CPSC 322 Search 5. Textbook 3.6. Search: A CPSC 322 Search 5, Slide 1
Search: A CPSC 322 Search 5 Textbook 3.6 Search: A CPSC 322 Search 5, Slide 1 Lecture Overview 1 Recap 2 A Search 3 Optimality of A Search: A CPSC 322 Search 5, Slide 2 Search with Costs Sometimes there
More informationThe Pythagorean Theorem: For a right triangle, the sum of the two leg lengths squared is equal to the length of the hypotenuse squared.
Math 1 TOOLKITS TOOLKIT: Pythagorean Theorem & Its Converse The Pythagorean Theorem: For a right triangle, the sum of the two leg lengths squared is equal to the length of the hypotenuse squared. a 2 +
More information5/27/12. Objectives 7.1. Area of a Region Between Two Curves. Find the area of a region between two curves using integration.
Objectives 7.1 Find the area of a region between two curves using integration. Find the area of a region between intersecting curves using integration. Describe integration as an accumulation process.
More informationNavigation and Metric Path Planning
Navigation and Metric Path Planning October 4, 2011 Minerva tour guide robot (CMU): Gave tours in Smithsonian s National Museum of History Example of Minerva s occupancy map used for navigation Objectives
More informationPuzzle page. Mathematical Misfits three dimensional. Dual polygons. Puzzle page
1997 2009, Millennium Mathematics Project, University of Cambridge. Permission is granted to print and copy this page on paper for non commercial use. For other uses, including electronic redistribution,
More informationSecure and Accurate Network Coordinate Systems
Secure and Accurate Network Coordinate Systems A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY D. Eric Chan-Tin IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
More informationA Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays
A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays Jeffrey Shneidman, Peter Pietzuch, Matt Welsh, Margo Seltzer, Mema Roussopoulos Systems Research Group Harvard University
More informationGreedy Routing by Network Distance Embedding
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL., NO., MON YEAR Greedy Routing by Network Distance Embedding Chen Qian, Member, IEEE, Member, ACM and Simon S. Lam, Fellow, IEEE, Fellow, ACM Abstract Greedy routing
More informationAuthors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao
Title: Moving Beyond End-to-End Path Information to Optimize CDN Performance Authors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao
More informationYou ll use the six trigonometric functions of an angle to do this. In some cases, you will be able to use properties of the = 46
Math 1330 Section 6.2 Section 7.1: Right-Triangle Applications In this section, we ll solve right triangles. In some problems you will be asked to find one or two specific pieces of information, but often
More informationTriangulation: A new algorithm for Inverse Kinematics
Triangulation: A new algorithm for Inverse Kinematics R. Müller-Cajar 1, R. Mukundan 1, 1 University of Canterbury, Dept. Computer Science & Software Engineering. Email: rdc32@student.canterbury.ac.nz
More informationPharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction
: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng,XingLi Department of Electronic Engineering, Tsinghua
More informationYear Long Mathematics Plan Fourth Grade First Quarter: Discovering Patterns and Relationships (~5 weeks)
Year Long Mathematics Plan Fourth Grade First Quarter: Discovering Patterns and Relationships (~5 weeks) *Concepts covered: patterns, relationships, T-tables, and graphs. *Critical Content: comparing,
More informationDCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines
DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines Mohammad Noormohammadpour, Cauligi S. Raghavendra Ming Hsieh Department of Electrical Engineering University of Southern
More informationInformed search. Soleymani. CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016
Informed search CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Soleymani Artificial Intelligence: A Modern Approach, Chapter 3 Outline Best-first search Greedy
More informationReview of Sine, Cosine, and Tangent for Right Triangle
Review of Sine, Cosine, and Tangent for Right Triangle In trigonometry problems, all vertices (corners or angles) of the triangle are labeled with capital letters. The right angle is usually labeled C.
More informationExperimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System
Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua National Laboratory for Information Science and
More informationCS268: Beyond TCP Congestion Control
TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s
More informationToday s s lecture. Lecture 3: Search - 2. Problem Solving by Search. Agent vs. Conventional AI View. Victor R. Lesser. CMPSCI 683 Fall 2004
Today s s lecture Search and Agents Material at the end of last lecture Lecture 3: Search - 2 Victor R. Lesser CMPSCI 683 Fall 2004 Continuation of Simple Search The use of background knowledge to accelerate
More informationSwitching and Forwarding
Switching and Forwarding Outline Store-and-Forward Switches Bridges and Extended LANs Spring 7 CSE64 Switch Switching protocol T T STS- Spring 7 CSE64 Scalable Networks Switch forwards packets from input
More informationBGP Path Exploration Damping (PED)
BGP Path Exploration Damping (PED) Mattia Rossi mrossi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline Introduction Motivation Path Exploration
More informationCHAPTER 4 K-MEANS AND UCAM CLUSTERING ALGORITHM
CHAPTER 4 K-MEANS AND UCAM CLUSTERING 4.1 Introduction ALGORITHM Clustering has been used in a number of applications such as engineering, biology, medicine and data mining. The most popular clustering
More informationInverters with Capacitive Output Impedance (C-inverters)
Inverters with Capacitive Output Impedance (C-inverters) Yu Zeng Supervisor: Prof. Qing-Chang Zhong Department of Automatic Control and System Engineering The University of Sheffield UKACC PhD Presentation
More informationMultimedia-unfriendly TCP Congestion Control and Home Gateway Queue Management
Multimedia-unfriendly TCP Congestion Control and Home Gateway Queue Management Lawrence Stewart α, David Hayes α, Grenville Armitage α, Michael Welzl β, Andreas Petlund β α Centre for Advanced Internet
More information6.2 Volumes by Disks, Washers, and Cross-Sections
6.2 Volumes by Disks, Washers, and Cross-Sections General Principle: Disks Take slices PERPENDICULAR to axis of rotation and rotate around that axis. About x-axis: About y-axis: 1 Examples: Set up integrals
More informationTemporally Adaptive A* Algorithm on Time Dependent Transportation Network
Temporally Adaptive A* Algorithm on Time Dependent Transportation Network Nianbo Zheng, Feng Lu Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing, 100101,
More informationCloth Hair. and. soft bodies
Cloth Hair Lesson 11 and soft bodies Lesson 08 Outline Problem definition and motivations Modeling deformable solids with mass-spring model Position based dynamics Modeling cloths with mass-spring model
More informationChapter 11: Indexing and Hashing
Chapter 11: Indexing and Hashing Basic Concepts Ordered Indices B + -Tree Index Files B-Tree Index Files Static Hashing Dynamic Hashing Comparison of Ordered Indexing and Hashing Index Definition in SQL
More information2. Graphical Transformations of Functions
2. Graphical Transformations of Functions In this section we will discuss how the graph of a function may be transformed either by shifting, stretching or compressing, or reflection. In this section let
More informationMULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
Algebra Midterm Review Packet # Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Write the set. ) E is the set of odd natural numbers between
More information2.0 Trigonometry Review Date: Pythagorean Theorem: where c is always the.
2.0 Trigonometry Review Date: Key Ideas: The three angles in a triangle sum to. Pythagorean Theorem: where c is always the. In trigonometry problems, all vertices (corners or angles) of the triangle are
More informationA Scalable Content- Addressable Network
A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 27 On Suitability of Euclidean Embedding for Host-Based Network Coordinate Systems Sanghwan Lee, Zhi-Li Zhang, Member, IEEE, Sambit Sahu,
More informationTopologically-Aware Overlay Construction and Server Selection
Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker Abstract A number of large-scale distributed Internet applications could potentially
More informationSurface Simplification Using Quadric Error Metrics
Surface Simplification Using Quadric Error Metrics Authors: Michael Garland & Paul Heckbert Presented by: Niu Xiaozhen Disclaimer: Some slides are modified from original slides, which were designed by
More informationVEEAM. Accelerating virtual machine replication with PORTrockIT
VEEAM Accelerating virtual machine replication with PORTrockIT EXECUTIVE SUMMARY Business continuity solutions such as Veeam offer the ability to recover quickly from disaster by creating a replica of
More informationChapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview
Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network
More informationAttacks on Phoenix: A Virtual Coordinate System
Attacks on Phoenix: A Virtual Coordinate System Manpreet Kaur manpreet.7467@gmail.com Lovely Professional University Jalandhar (Punjab) Abstract Many large-scale internet application take use of network
More informationBGP Case Studies. ISP Workshops
BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated
More informationForces acting on a lamina
Forces acting on a lamina This example considers the net effect of a number of forces acting on an extended body and can be used to show the concept moments. It is designed to follow on from Forces acting
More informationSimulation in Computer Graphics. Deformable Objects. Matthias Teschner. Computer Science Department University of Freiburg
Simulation in Computer Graphics Deformable Objects Matthias Teschner Computer Science Department University of Freiburg Outline introduction forces performance collision handling visualization University
More informationHow Routing Algorithms Work
How Routing Algorithms Work A router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information
More informationCS244a: An Introduction to Computer Networks
Do not write in this box MCQ 9: /10 10: /10 11: /20 12: /20 13: /20 14: /20 Total: Name: Student ID #: CS244a Winter 2003 Professor McKeown Campus/SITN-Local/SITN-Remote? CS244a: An Introduction to Computer
More informationInternet Traffic Classification using Machine Learning
Internet Traffic Classification using Machine Learning by Alina Lapina 2018, UiO, INF5050 Alina Lapina, Master student at IFI, Full stack developer at Ciber Experis 2 Based on Thuy T. T. Nguyen, Grenville
More informationCHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC
CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC 6.1 Introduction The properties of the Internet that make web crawling challenging are its large amount of
More informationImproving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems
Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Yang Chen,PengSun 2, Xiaoming Fu, Tianyin Xu,3 Institute of Computer Science, University of Goettingen, Germany 2
More informationThe Question papers will be structured according to the weighting shown in the table below.
3. Time and Mark allocation The Question papers will be structured according to the weighting shown in the table below. DESCRIPTION Question Paper 1: Grade 12: Book work, e.g. proofs of formulae (Maximum
More informationThis blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane?
Intersecting Circles This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane? This is a problem that a programmer might have to solve, for example,
More informationMATHEMATICS DEPARTMENT COURSE OUTLINE TERM 1/2/3 YEAR 7
MATHEMATICS DEPARTMENT COURSE OUTLINE 2016-17 TERM 1/2/3 YEAR 7 Week Topic YEAR 7- Mathematics Term 1 plan 2016-2017 Learning outcomes 1/2 Numbers and the number system Recall prime numbers up to 50 Know
More informationOverlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma
Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network
More informationIMMACULATE CONCEPTION BOYS HIGH SCHOOL-MUKUYU FORM THREE MATHEMATICS EXAM 1 TERM
IMMACULATE CONCEPTION BOYS HIGH SCHOOL-MUKUYU FORM THREE MATHEMATICS EXAM 1 TERM 1 2018 NAME ADM NO..CLASS. SECTION I (50 MARKS) Answer all questions 1. Simplify without using a calculator 3 1 3 22 3 15
More informationDistributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers
Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Ljubica Blazević Jean-Yves Le Boudec Institute for computer Communications and Applications (ICA) Swiss
More informationA Distributed Web Cache using Load-Aware Network Coordinates
A Distributed Web Cache using Load-Aware Network Coordinates Nicholas Ball Department of Computing Imperial College, London Supervisor: Peter Pietzuch Second Marker: Alexander L. Wolf June 17, 2008 Abstract
More informationCopyright 2004 OCCAID. All rights reserved.
Copyright 2004 OCCAID. All rights reserved. Basic overview of OCCAID (who we are and what we are doing with IPv6..). Today s problem with the IPv6 internet. OCCAID s approach to IPv6 BGP Policies OCCAID
More informationImproving Search In Peer-to-Peer Systems
Improving Search In Peer-to-Peer Systems Presented By Jon Hess cs294-4 Fall 2003 Goals Present alternative searching methods for systems with loose integrity constraints Probabilistically optimize over
More informationEECS 122: Introduction to Communication Networks Final Exam Solutions
EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead
More informationCost Models for Query Processing Strategies in the Active Data Repository
Cost Models for Query rocessing Strategies in the Active Data Repository Chialin Chang Institute for Advanced Computer Studies and Department of Computer Science University of Maryland, College ark 272
More information